Computer en informatica

Clemens Willemsen

Connectiviteit van consumentenapparaten door de jaren heen

Hoe zijn elektronische consumentenapparaten zoals de televisie en de personal computer de afgelopen (zeven) decennia fysiek aan elkaar gekoppeld?
24,95

Nieuw in Computer en informatica

Aanbiedingen in Computer en informatica

-55%
Ben Frain
€ 81,35
€ 36,95
-27%
Christine Alvarado
€ 80,20
€ 58,95
-24%
€ 58,79
€ 44,95
-23%
Peter Flach
€ 67,44
€ 51,95

TOP 5 Computer en informatica

Theory of Fun for Game Design
Raph Kostet
Theory of Fun for Game Design
50,91
Op voorraad | Vandaag voor 21:00 besteld, morgen in huis | Gratis verzonden
1
Ik ben AI-geletterd!
Team VDM
Ik ben AI-geletterd!
24,99
Op voorraad | Vandaag voor 23:00 besteld, morgen in huis | Gratis verzonden
2
Prompten als een Pro
Bob van Duuren
Prompten als een Pro
34,99
Op voorraad | Vandaag voor 23:00 besteld, morgen in huis | Gratis verzonden
3
Geavanceerd ChatGPT, 3e editie
Bob van Duuren
Geavanceerd ChatGPT, 3e editie
34,99
Op voorraad | Vandaag voor 23:00 besteld, morgen in huis | Gratis verzonden
4
Exam Ref SC-300 Microsoft Identity and Access Administrator
Razi Rais
Exam Ref SC-300 Microsoft Identity and Access Administrator
50,14
5

Online magazine

Jan Pelzl, Tim Guneysu

Understanding Cryptography

Understanding and employing cryptography has become central for securing virtually any digital application, whether user app, cloud service, or even medical implant. Heavily revised and updated, the long-awaited <b>second edition</b> of <b><i>Understanding Cryptography </i></b>follows the unique approach of making modern cryptography accessible to a broad audience, requiring only a minimum of prior knowledge. After introducing basic cryptography concepts, this seminal textbook covers nearly all symmetric, asymmetric, and post-quantum cryptographic algorithms currently in use in applications—ranging from cloud computing and smart phones all the way to industrial systems, block chains, and cryptocurrencies. <b>Topics and features:</b> -Opens with a foreword by cryptography pioneer and Turing Award winner, Ron Rivest -Helps develop a comprehensive understanding of modern applied cryptography -Provides a thorough introduction to post-quantum cryptography consisting of the three standardized cipher families -Includes for every chapter a comprehensive problem set, extensive examples, and a further-reading discussion -Communicates, using a unique pedagogical approach, the essentials about foundations and use in practice, while keeping mathematics to a minimum -Supplies up-to-date security parameters for all cryptographic algorithms -Incorporates chapter reviews and discussion on such topics as historical and societal context This must-have book is indispensable as a textbook for graduate and advanced undergraduate courses, as well as for self-study by designers and engineers. The authors have more than 20 years’ experience teaching cryptography at various universities in the US and Europe. In addition to being renowned scientists, they have extensive experience with applying cryptography in industry, fromwhich they have drawn important lessons for their teaching.
84,99
Bekijk resultaten in...
Alle producten Managementboeken Seminars + Trainingen Online magazine Sale

Filter de resultaten

Actieve filters 1

Computer en informatica

Managementrubriek

Toon meer

Aanbevolen

Producten

Taal

Toon meer

Serie

Toon meer

Ministerie

Trefwoorden

Toon meer

Prijs

-
Toon resultaten
Filteren 1
Sorteren
Pagina 1246 van 50.284 resultaten
Alle producten
GebondenEngels9781439856413 3-10-2011
Cloud computing has created a shift from the use of physical hardware and locally managed software-enabled platforms to that of virtualized cloud-hosted services.  Meer
212,49
Verwachte levertijd ongeveer 11 werkdagen
PaperbackEngels9781442252912 1-8-2015
Wearable Technology: Smart Watches to Google Glass for Libraries provides a comprehensive overview of the current wearable technology landscape, the types of devices and functionality available, the benefits and limitations of this type of technology, and how you can make use of it in your library.  Meer
70,34
Verwachte levertijd ongeveer 16 werkdagen
PaperbackEngels9781442255487 10-4-2016
99,23
Verwachte levertijd ongeveer 16 werkdagen
paperbackEngels9781441924810 25-11-2010
This book introduces a new theory in Computer Vision yielding elementary techniques to analyze digital images. These techniques are a mathematical formalization of the Gestalt theory.  Meer
60,99
Verwachte levertijd ongeveer 9 werkdagen
paperbackEngels9781441925183 6-12-2010
Deformable objects are ubiquitous in the world surrounding us, on all levels from micro to macro. The need to study such shapes and model their behavior arises in a wide spectrum of applications, ranging from medicine to security.  Meer
60,99
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9781441971326 10-8-2010
Insider Threats in Cyber Security is a cutting edge text presenting IT and non-IT facets of insider threats together. This volume brings together a critical mass of well-established worldwide researchers, and provides a unique multidisciplinary overview.  Meer
120,99
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9781441971418 11-11-2010
Social networking is a concept that has existed for a long time; however, with the explosion of the Internet, social networking has become a tool for people to connect and communicate in ways that were impossible in the past.  Meer
180,99
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9781441971470 31-8-2010
Software components and component-based software development (CBSD) are acknowledged as the best approach for constructing quality software at reasonable cost.  Meer
180,99
Verwachte levertijd ongeveer 9 werkdagen
120,99
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9781441971937 11-8-2010
Cooperative and relay communications have recently become the most widely explored topics in communications, whereby users cooperate in transmitting their messages to the destination, instead of conventional networks which operate independently and compete among each other for channel resources.  Meer
180,99
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9781441972781 21-9-2010
A new model of business has emerged within the Digital-Economy called Internetworked Enterprise (IE); it’s a model that posits networks, communities of individuals and refusal of a centralized mindset as the core elements of the new frame of reference.  Meer
120,99
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9781441973139 10-8-2010
Queueing theory applications can be discovered in many walks of life including; transportation, manufacturing, telecommunications, computer systems and more.  Meer
120,99
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9781441973191 11-8-2010
As Grids and service-oriented architectures have evolved to a common infrastructure for providing and consuming services in research and commercial environments, mechanisms are needed to agree on the objectives and the quality of such service provision.  Meer
180,99
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9781441973252 25-2-2011
This book describes a complete revolution in software engineering based on complexity science through the establishment of NSE – Nonlinear Software Engineering paradigm which complies with the essential principles of complexity science, including the Nonlinearity principle, the Holism principle, the Complexity Arises From Simple Rules principle, the Initial Condition Sensitivity principle, the Sensitivity to Change principle, the Dynamics principle, the Openness principle, the Self-organization principle, and the Self-adaptation principle.  Meer
240,99
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9781441973344 9-9-2010
The emergence of Web technologies for the distribution of an immense amount of data and knowledge has given rise to the need for supportive frameworks for kno- edge management.  Meer
180,99
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9781441976581 13-10-2010
Privacy requirements have an increasing impact on the realization of modern applications. Commercial and legal regulations demand that privacy guarantees be provided whenever sensitive information is stored, processed, or communicated to external parties.  Meer
120,99
Verwachte levertijd ongeveer 9 werkdagen
GebondenEngels9781420079005 20-10-2008
Offers Both Standard and Novel Approaches for the Modeling of SystemsExamines the Interesting Behavior of Particular Classes of Models Chaotic Modelling and Simulation: Analysis of Chaotic Models, Attractors and Forms presents the main models developed by pioneers of chaos theory, along with new extensions and variations of these models.  Meer
184,29
Verwachte levertijd ongeveer 11 werkdagen
GebondenEngels9781420079463 13-6-2013
The reach of algebraic curves in cryptography goes far beyond elliptic curve or public key cryptography yet these other application areas have not been systematically covered in the literature.  Meer
141,98
Verwachte levertijd ongeveer 11 werkdagen
GebondenEngels9781420080322 15-3-2011
Seeking new methods to satisfy increasing communication demands, researchers continue to find inspiration from the complex systems found in nature. From ant-inspired allocation to a swarm algorithm derived from honeybees, Bio-Inspired Computing and Networking explains how the study of biological systems can significantly improve computing, networking, and robotics.  Meer
268,89
Verwachte levertijd ongeveer 11 werkdagen
GebondenEngels9781433165436 30-4-2019
This book proposes a genre-aware, semiotic-aware, critical framework that aims at analyzing digital literacies required and practiced by online journalists.  Meer
112,89
Verwachte levertijd ongeveer 16 werkdagen

Rubrieken

    Personen

      Trefwoorden